Skip to main content
Springer Nature - PMC COVID-19 Collection logoLink to Springer Nature - PMC COVID-19 Collection
. 2021 Jul 1;121(1):307–318. doi: 10.1007/s11277-021-08636-4

Pairing Free Certified Common Asymmetric Group Key Agreement Protocol for Data Sharing Among Users with Different Access Rights

An Braeken 1,
PMCID: PMC8248296  PMID: 34230770

Abstract

Research into a pandemic like Covid-19 needs a tremendous input of patient histories and characteristics. Patients and doctors are only willing to share these sensitive data when they are ensured that the data are solely used by legitimate research laboratories. Asymmetric group key agreement (AGKA) protocols provide a good cryptographic primitive to address this requirement. The AGKA protocols proposed in literature provide users with a common public group key and a different decryption key by relying on compute intensive pairing operations. In this paper, we propose a new primitive, called the Common AGKA (CAGKA) protocol in which the users share the same private-public key pair, resulting in a more efficient solution. By combining Elliptic Curve Qu Vanstone certificates and a recently proposed Canetti–Krawczyk (CK) secure mutual authentication protocol, a one round self-certified pairing free CAGKA protocol is defined, which can be also globally certified after one additional round.

Keywords: Asymmetric group key, Elliptic curve cryptography, Implicit certificates, Canetti–Krawczyk (CK) security

Introduction

Group key agreement protocols in literature can be distinguished into two categories, being the ones that lead to the construction of a common shared secret symmetric key and the ones resulting in a common shared public key. This last category is also called the asymmetric group key agreement (AGKA) protocol and has been proposed in [1]. In their definition and also the other follow-up constructions [26], the individual users of the group possess their own corresponding private key, which is different from the other participants of the group.

For symmetric group key agreement (SGKA) protocols, there is a group coordinator required, which chooses the key and shares it among the different members based on the individual input of the different members using secret sharing techniques (for instance by means of Lagrange interpolation). An SGKA protocol relying on solely symmetric key based operations has been proposed in [7] and a mutual authenticated SGKA protocol based on Elliptic Curve Cryptography (ECC) is presented in [8]. Recently, in [9], another ECC based SGKA scheme has been proposed, offering in addition resistance to ephemeral key compromise attacks. These attacks exploit the knowledge of random values used in the scheme, e.g. leaked by time analysis or other side channel techniques, to retrieve the session key. Besides the vulnerability for key escrow in SGKA protocols, this approach is also not advisable in case not all participants of the group possess “read” rights. For instance, in the use case of data sharing from individuals to a group of trusted laboratories, the individuals should not be able to derive the input of others.

Instead, the AGKA protocols provide a perfect solution to distinguish between users with only “write” rights and users with both “read” and/or “write” rights. The AGKA protocols are distributed one-round protocols, that do not require the different users to stay online to concurrently run the protocol. The latest generation of AGKA protocols is designed to enable the users without additional communication rounds to verify the correctness and authentication of the other participants, taking into account both passive and active attackers [36]. There are also some schemes that associate attribute based control to the construction of the AGKA protocols [1012].

However, all of these schemes are relying on compute intensive pairing operations, used both in the key agreeement phase and in the actual encryption/decryption process afterwards. Moreover none of them are able to offer ephemeral key compromise protections and only allow certification of the public key among the group members.

To conclude, in order to offer a viable solution for data sharing, the objective in this paper is to focus on the construction of an AGKA variant protocol to address the above mentioned shortcomings. This results in the following contributions.

  • We argue the usefulness of having different decryption keys as in the AGKA protocols in literature and define the Common AGKA (CAGKA) protocols in which users share the same private-public key pair.

  • We propose a single round pairing free CAGKA protocol applicable for users being certified by different certificate authorities (CAs) and offering protection in the Canetti–Krawczyk (CK) security model [13], where an adversary is also able to reveal session state specific information, session keys, or long-term private keys. This automatically implies the presence of perfect forward secrecy and protection against the ephemeral key compromise attack.

  • We propose an additional round to enable implicit certification, allowing other parties to verify the certificate of the group key by integrating the Elliptic Curve Qu Vanstone (ECQV) certificates [14].

Related Work

The AGKA protocol has been introduced by Wu et al. in 2009 [1]. Their proposed protocol consisted of a single round, enabling each participant to publish independently their public key contribution, without the need of being connected during the protocol. First, it was defined for a fixed group, later for a dynamic group [2]. Different types of features have been added to the AGKA protocols in later years. In [5], Ranjani et al. propose an ID-based approach to protect against active attacks and to avoid reliance on a trusted dealer. Since the group controller distributes the secret keys to the other participants, the scheme is vulnerable for key escrow. In addition, it also suffers from the ephemeral key compromise attack. In [4], Lv et al. proposed the combination with a certificateless public key cryptosystem to avoid key escrow and to enable the members of the group to self-certify the resulting public key in a single round. The scheme is not resistant against the ephemeral key compromise attack and is not able to offer perfect forward secrecy in which the previous session keys are protected even if the secret key of one of the participants leaks. In [3], Zhang et al. propose a cross domain self-certified authenticated group key protocol, in which the users can come from different authorization domains. Their protocol assumes the existence of a so called alliance public key between the different certificate authorities. The construction of this key has not been explained. In fact, its construction can be made by our CAGKA protocol. In addition, no perfect forward secrecy is obtained and there is also no protection against the ephemeral key compromise attack. Finally, there is the scheme of Chen et al. [6], in which also an identity-based cross-domain authenticated asymmetric group key is established. Here the validity of the public keys is guaranteed by the three-layer cross domain network architecture. This scheme satisfies forward secrecy, but offers still no protection against the ephemeral key compromise attack.

In all of the approaches mentioned above, only the members of the group are able to verify the validity of the group key. To conclude, as far as the authors are aware, all the proposed asymmetric group key agreement protocols are pairing based, which are very compute intensive cryptographic operations.

Preliminaries

Cryptographic Operations

The underlying cryptographic operations used in this paper are based on Elliptic Curve Cryptography (ECC). In ECC, an elliptic curve (EC) Ep over Fp is considered with generator G of order q. The security in ECC relies on the hardness of both the Elliptic Curve Discrete Logarithm Problem (ECDLP) and the Elliptic Curve Diffie Hellman Problem (ECDHP). In ECDLP, it is computationally hard for any polynomial-time bounded algorithm to determine a parameter xFq for which Q=xG, given Q and G. ECDHP states that given xGyG, it is computationally hard to derive xyG.

We further utilise two basic symmetric key based primitives, a hash algorithm and symmetric key encryption/ decryption. The hash of a concatenated message M1,M2, is denoted by H(M1,M2) and results in an output of fixed length. The hash function should offer protection against collision, pre-image and second-image attacks. The symmetric key encryption encrypts a message M into a ciphertext C such that C=EK(M) using the shared secret key K. The decryption is denoted by M=DK(C).

The scheme is built upon the combination or integration of two primitives, described in literature.

Elliptic Curve Qu Vanstone (ECQV) Certificates

ECQV certificates [14] enable a participant to derive a secret key without the need for a secure channel and without the Certificate Authority (CA) knowing this secret. In addition, based on identity and certificate, any other participant is able to derive the corresponding public key. The protocol consists of two rounds. First the participant Ui with identity IDi chooses a random variable riFq and computes Ri=riG. The message IDi,Ri is sent to the CA, who possesses the private-public key pair (dc,Qc=dcG), where Qc is publicly known and certified to all users. Here, the CA also chooses a random variable rcFq to derive Rc=rcG and defines the certificate Certi=Ri+Rc. Next, the CA determines auxiliary information a=H(Certi,IDi)rc+dc and sends a,Certi to Ui. Based on this information, Ui is able to derive its private key di=H(Certi,IDi)ri+a. If diG=H(Certi,IDi)Certi+Qc, then Ui accepts the key pair (di,Qi).

Authentication Protocol Secure in CK Model

In [15], a highly efficient elliptic curve (EC) based mutual authentication protocol between a smart meter and service provider satisfying security in the CK security model has been presented. Let the smart meter possess the key pair (d1,Q1) together with random EC point R1=r1G and the service provider possess (d2,Q2) with R2=r2G. Only the EC points Q1,R1,Q2,R2 are publicly available. Then, the protocol defines the session key SK as

SK=H(h1r1+d1)(h2R2+Q2))=H(h1R1+Q1)(h2r2+d2))

with h1=H(ID1,ID2,R1,R2,Q1,Q2) and h2=H(ID2,ID1,R2,R1,Q2,Q1).

Security Model

In our setting, we assume n users U1,...,Un aiming to generate a common private-public key pair, where U1 is responsible for the selection of the participating users and the initial collection of the key material, which should be made publicly available in order to initiate the actual protocol. Next, the users broadcast their contribution to the group key over an open public channel.

We further consider the existence of a passive and active attacker. As a consequence, messages sent in the open channel can not only be eavesdropped, but can also be captured, removed, and changed and even new messages can be inserted.

In addition, we also assume that the attacker is able to retrieve the long term secret private key or session specific random values of the users participating in the protocol, cf. the CK security model.

Moreover, also the existence of malicious insider users are considered, which try to impersonate legitimate users.

SGKA, AGKA and CAGKA Protocols

The main underlying difference between AGKA and CAGKA type of protocols is that in CAGKA all users share the same private key. The private key in AGKA is only used for decryption of the messages, which are encrypted with the public group key. In both AGKA and CAGKA, if a user is compromised, a remove user procedure should be installed, where all users need to restart the key agreement procedure. Consequently, no direct advantages, both from a security or efficiency point of view, are linked to AGKA compared to CAGKA.

One could say that SGKA can be easily transformed to CAGKA protocols by considering the resulting shared symmetric key as the private key. However, the main difference between SGKA and CAGKA is that SGKA still remains vulnerable for key escrow attacks.

Proposed Scheme

We consider four main phases in the proposed scheme. First, there is the registration phase, followed by the self-certified group key agreement phase and optionally further finished by the CA-certified group key agreement phase. Finally, there is also the group update phase in which a user leaves or joins the group.

Registration Phase

In the registration phase, the different participants Ui for i{1,...n} derive a key pair (di,Qi) by its CA via ECQV. Denote the corresponding certificate by Certi and public key of the CA by Qc. For ease in notation, we here consider the existence of one CA, but with additional cost of publishing the CA public key, the participants can be connected also to different CAs like in [3].

Self-certified Group Key Agreement Phase

To start, each user Ui for i{1,...n} willing to participate in the group needs to publish its identity IDi, certificate Certi and EC point Ri constructed as Ri=riG with ri a randomly chosen value. The group controller, e.g. U1 makes sure that this information is available.

Next, any user Ui with i{1,...n} chooses a random value ai and computes for all users Uj with j{1,...n},ji, Qj=H(Certj,IDj)Certj+Qc. Then, the secret shared key Kij=H(h1ri+di)(h2Rj+Qj)) with hashes h1=H(IDi,IDj,Ri,Rj,Qi,Qj) and h2=H(IDj,IDi,Rj,Ri,Qj,Qi) between Ui,Uj is derived by the CK mutual authentication scheme of [15]. This results in the parameter xij=EKij(ai), which is sent together with Ai=aiG to all other users Uj.

Consequently, each user Uj with j{1,...n},ji is now able to derive from the available information Ri,IDi,Certi of Ui the shared key by computing Kij=H(h1Ri+Qi)(h2rj+dj)) with h1=H(IDi,IDj,Ri,Rj,Qi,Qj) and h2=H(IDj,IDi,Rj,Ri,Qj,Qi) between Ui,Uj and retrieve ai by ai=DKij(xij). If aiG corresponds with the published EC point Ai, user Uj is guaranteed of the integrity and authentication of the value. After repeating this process for the n-1 users, a legitimate participant is then able to derive the asymmetric private group key dg=a1++an and the corresponding public group key by Qg=A1++An where Qg=dgG.

CA-Certified Group Key Agreement Phase

In the previous process, only the members of the group are ensured about the legitimacy of the other participants. An outsider receiving the group public key Qg cannot verify the relation with the involved entities. Therefore, the ECQV mechanism is now applied on top of the previous phase.

For this, similar as in ECQV, the CA chooses a random value rc and computes Rc=rcG. The resulting certificate becomes Certg=Qg+Rc=A1++An+Rc. Define IDg=H(ID1,...,IDn). The auxiliary value equals to a=H(Certg,IDf)rc+dc and sends a,Certg to {U1,...,Un}. Based on this information, each Ui is able to derive the private key dgc=H(Certg,IDg)dg+a. If Qgc=dgcG=H(Certg,IDg)Certg+Qc, the Ui accepts the key pair (dgc,Qgc).

Group Update Phase

In case a user leaves or enters the group, the other users Ui can keep the random value Ri, resulting in the same session keys Kij with the other still remaining users Uj. Only the value ai should be updated in order to guarantee perfect forward and backward security. Note that after a fixed time or a certain amount of key update phases, each user needs to refresh the random key Ri. It is of course a trade-off in storing these common shared keys (efficiency) and recomputing the keys/redefining random values (security) and is mainly determined by the frequency of updates. The new user follows the same procedure as mentioned in the self-certified group key agreement phase. For the resulting group key, a CA-certified group key agreement phase can also be defined.

Security Analysis

An asymmetric group key agreement protocol is secure if it is able to guarantee that only the intended users of the group are able to compute the private group key. For this type of protocol, several generally accepted desirable security properties are defined [16].

  • Known-key security ensures that if the protocol is successfully finished, each legitimate participant is able to compute the unique private key. Even if group private keys of some previous sessions are leaked, the security of the private keys in the other sessions is not compromised. This feature is clearly valid in our proposed scheme due to the usage of different random values ai,ri in each protocol run and the protection against the ephemeral key compromise attack, inherently present in the CK security model applicable in the construction of the keys Kij.

  • Unknown key-share security guarantees that all users are the real users as claimed during the group construction. The established session keys Kij among the pairs of users Ui,Uj can only be derived by the true users as they claimed to be. This follows immediately from the construction of the symmetric keys used to encrypt the values ai, which is based on both the mutual CK secure authentication protocol of [15] and the ECQV protocol.

  • Key compromise impersonation security ensures that if an attacker is able to compromise the long term private key of a user and thus to impersonate that user, the impact should be limited to that user. This feature is inherently present in the CK security model and thus valid thanks to the usage of the mutual CK secure authentication protocol of [15].

  • Key control security states that none of the users is capable to force the session key to be a preselected value. The other users are not able to change the chosen parameters ai of the other users Ui without being noticed. Although, a legitimate user Uk (with k{j,i}) is able to derive the input ai of the published outputs xij, it is not able to retrieve Kij since symmetric key cryptographic protocols are designed to resist such known-plaintext attacks.

The formal security of the proposed protocols described in Sect. 4 can be easily deducted from the security of the two underlying primitives.

Theorem 1

The self-certified group key agreement phase offers session key security under the CK adversary model [13] and in the random oracle model.

The self-certified group key agreement phase between n participants is built upon n2 applications of the mutual CK secure authentication protocol of [15]. The security of this protocol has been proven in the random oracle model in [15] and is strongly related to the computational hardness of the ECDH problem and the collision resistance of the hash function. The same conclusions of [15] on the advantage of the adversary in attacking the protocol can thus made here.

Theorem 2

The CA-certified group key agreement phase is secure in the random oracle model.

This protocol is a direct application of the ECQV protocol, whose security has been formally proven in [17] and relies on the fact that the ECDLP is intractable.

Table 1 provides an overview of the differences in security features between several other AGKA and SAGKA protocols in literature. From this table, we can conclude that our proposed protocols are the only ones offering CK security, i.e. satisfying both resistance to the ephemeral key compromise attack and perfect forward secrecy, among the AGKA protocols. In addition, our CA certified group key agreement protocol is the only one in literature offering a global certificate to the resulting group key.

Table 1.

Comparison of security features, where V1 denotes the self certified version and V2 the global CA certified version (Y=Yes, N=No)

[3] [4] [5] [6] [9] V1 V2
Ephemeral key attack N N N N Y Y Y
Perfect forward secrecy N N Y Y Y Y Y
No key escrow attack Y Y N N N Y Y
Different CAs Y N N Y Y Y Y
Global certified N N N N N N Y

Efficiency Analysis

Computational Costs

For the efficiency analysis, we consider 160-bit security level and use the performance results of the different cryptographic operations as mentioned in [3, 18]. There, the results are obtained after implementation of the cryptographic primitives on an Intel R Core RM 2 Duo E8400 CPU3 (3.00GHz) ubuntu 10.04.

Table 2 compares the number of most compute intensive operations between the proposed CAGKA protocol and [36, 9] for the key agreement phase, the encryption and decryption using the derived key. Denote the pairing operation as a function e:G1×G1G1 and define the EC also in G1. We then denote by Tm the time cost for a modular multiplication in G1, Te1,Te2 the time cost for a modular exponentiations over G1, G2 and Tp the time cost for a pairing operation. Note that for our protocol, we here consider the usage of the ECIES encryption protocol [19] for the encryption/decryption, while in [9] only a symmetric key encryption is required. Since this is negligible compared to the rest, we keep the corresponding entries empty in the table.

Table 2.

Comparison of computational complexity, where V1 denotes the self certified version and V2 the global CA certified version

Key construction Encryption Decryption
[3] 2nTp+(3n+2)Tm 1Te2 1Tp
[4] nTp+(3n-1)Tm 1Te2+2Tm 2Tp
[5] nTp+4nTe1 1Te2+2Te1 3Tp
[6] 3Tp+5nTm 2Tm+1Te2 1Tm+2Tp
[9] (9n+2)Tm
V1 7nTm 2Tm 1Tm
V2 (9n+1)Tm 2Tm 1Tm

The impact on the efficiency between the different protocols increases with increasing number of participants and has been shown in Fig. 1. For instance, in our self-certified protocol, a group of 100 participants is able to derive the group key in only 11 ms, while it takes 14 ms, 21 ms, 440 ms, 876 ms and 1990 ms in [36, 9] respectively. Due to the high number of [5], the performance of this scheme is omitted in Fig. 1. The global CA certified version takes approximately 111 ms, which is still better than most of the other schemes. It should be noted that the scheme of [6] is very efficient, compared to the other pairing based schemes as it only requires a fixed number of pairing operations in the key construction, independent of the group size. For values of n larger than 410, the scheme of [6] even outperforms the proposed CAGKA scheme. To summarize, our protocol behaves best for the key agreement phase, even better than the SGKA protocol for group sizes smaller than 410. Also, with respect to encryption and decryption, the difference is huge compared to the other AGKA protocols.

Fig. 1.

Fig. 1

Performance comparison for a varying number of participants (Note that the results of [5] are omitted due to the very high numbers.)

Communication Costs

For analyzing the communication costs, we consider again the 160-bit security level.

Next, we also derived the communication cost with respect to the number of sent and received bits. Figures 2, 3 and 4 show the evolution in terms of groups size for the number of bits sent, received and total amount of bits sent and received respectively. With respect to sent bits, our both schemes outperform the other schemes, followed by the schemes of [3, 4, 6]. The number of bits sent by [9] is almost 10 times higher than CAGKA. The number of bits sent by [5] is almost 15 times higher than the CAGKA scheme. For the amount of received bits, the scheme of [3] slightly outperforms the CAGKA schemes. The scheme of [4] has also similar results with respect to number of transmitted bits. The other schemes have a significantly higher communication overhead. Combining then the numbers of sent and received bits, it can be concluded that the proposed CAGKA protocols outperform the other protocols. Only the protocol of [3] is in the same range, followed by [4]. The other schemes [5, 6, 9] have significant higher costs.

Fig. 2.

Fig. 2

Number of transmitted bits (Note that the results of [5] are omitted due to the very high numbers.)

Fig. 3.

Fig. 3

Number of received bits

Fig. 4.

Fig. 4

Total amount of sent and received bits

Conclusion

We have introduced a new cryptographic primitive, called the common asymmetric group key agreement protocol (CAGKA), which has clear advantages compared to both AGKA and SGKA protocols. First, it avoids key escrow, which is inherently presence in SGKA protocols and second, it is much more efficient compared to AGKA protocols. We rely on ECC based mechanisms and develop by means of ECQV and a CK resistant mutual authentication protocol of [15], a one round self-certified pairing free CAGKA protocol. A global certification can be added after one additional round by applying the ECQV mechanism again. We show that these primitives outperform the state of the art with respect to security strength, computation and communication cost.

The scheme is very useful for scenarios of information sharing between users with different access rights, like eg. sharing of medical information among a group of experts. This can also be generalised to applications in wireless sensor networks, where the cluster heads take the role of participants and the sensors only need to securely transmit their information to this group. It can for instance result in facilitating the handover process of dynamic sensors crossing regions covered by the different cluster heads.

An Braeken

obtained her MSc Degree in Mathematics from the University of Gent in 2002. In 2006, she received her PhD in engineering sciences from the KULeuven at the research group COSIC (Computer Security and Industrial Cryptography). She became professor in 2007 at the Erasmushogeschool Brussel (currently since 2013, Vrije Universiteit Brussel) in the Industrial Sciences Department. Prior to joining the Erasmushogeschool Brussel, she worked for almost 2 years at the management consulting company Boston Consulting Group (BCG). Her current interests include security and privacy protocols for IoT, cloud and fog, blockchain and 5G security. She is (co-)author of over 120 publications. She has been member of the program committee for numerous conferences and workshops (IOP2018, EUC 2018, ICNS 2018, etc.) and member of the editorial board for Security and Communications magazine. She has also been member of the organizing committee for the IEEE Cloudtech 2018 conference and the Blockchain in IoT workshop at Globecom 2018. In addition, she is since 2015 reviewer for several EU proposals and ongoing projects, submitted under the programs of H2020, Marie Curie and ITN. She has cooperated and coordinated more than 12 national and international projects. She has been STSM manager in the COST AAPELE project (2014-2017) and is currently in the management committee of the COST RECODIS project (2016-2019).graphic file with name 11277_2021_8636_Figa_HTML.jpg

Declarations

Conflicts of interest

This research has been funded by the Tetra grant OpenCloudEdge. There are no conflicts of interest. Additional data can be given on demand.

Footnotes

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Wu, Q., Mu, Y., Susilo, W., Qin, B., & Domingo-Ferrer, J. (2009). Asymmetric group key agreement. In Proceedings EUROCRYPT, Lecture Notes in Computer Science (Vol. 5479, pp. 153–170). Springer.
  • 2.Wu Q, Mu Y, Susilo W, Qin B, Domingo-Ferrer J. Provably secure one-round identity based authenticated asymmetric group key agreement protocol. Information Sciences. 2011;181(19):4318–4329. doi: 10.1016/j.ins.2011.05.009. [DOI] [Google Scholar]
  • 3.Zhang Q, Gan Y, Zhang Q, Wang R, Tan YA. A dynamic and cross-domain authentication asymmetric group key agreement in telemedicine application. IEEE Access. 2018;6:24064–24074. doi: 10.1109/ACCESS.2018.2799007. [DOI] [Google Scholar]
  • 4.Lv X, Li H, Wang B. Authenticated asymmetric group key agreement based on certificateless cryptosystem. International Journal Computer Mathematics. 2014;91(3):447–460. doi: 10.1080/00207160.2013.806653. [DOI] [Google Scholar]
  • 5.Ranjani RS, Bhaskari DL, Avadhani PS. An extended identity based authenticated asymmetric group key agreement protocol. International Journal Network Security. 2015;17(5):510–516. [Google Scholar]
  • 6.Chen A, Hu C, Chen A, Zheng Q. An identity-based cross-domain authenticated asymmetric group key agreement. Information. 2021;12:112. doi: 10.3390/info12030112. [DOI] [Google Scholar]
  • 7.Carlier M, Steenhaut K, Braeken A. Symmetric-key-based security for multicast communication in wireless sensor networks. Computers. 2019;8(1):27. doi: 10.3390/computers8010027. [DOI] [Google Scholar]
  • 8.Porambage P, Braeken A, Schmitt C, Gurtov A, Ylianttila M, Stiller B. Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. IEEE Access. 2015;3:1503–1511. doi: 10.1109/ACCESS.2015.2474705. [DOI] [Google Scholar]
  • 9.Mandal S, Mhohant S, Majhi B. CL-AGKA: Certificateless authenticated group key agreement protocol for mobile networks. Wireless Networks. 2020;26:3011–3031. doi: 10.1007/s11276-020-02252-z. [DOI] [Google Scholar]
  • 10.Zhao X, Zhang F, Tian H. Dynamic asymmetric group key agreement for ad hoc networks. Ad Hoc Networks. 2011;9(5):928–939. doi: 10.1016/j.adhoc.2010.11.002. [DOI] [Google Scholar]
  • 11.Zhang Q, Ma Z, Tan Y. An authenticated asymmetric group key agreement for imbalanced mobile networks. Ad Hoc Networks. 2014;23(4):827–835. [Google Scholar]
  • 12.Gan Y, Wang B, Zhuang Y, Gao Y, Li Z, Zhang Q. An asymmetric group key agreement protocol based on attribute threshold for Internet of Things. Trans Emerging Tel Tech. 2020;2020:e417. [Google Scholar]
  • 13.Canetti, R., & Krawczyk, H. (2001). Analysis of key-exchange protocols and their use for building secure channels. In EUROCRYPT, Lecture Notes of Computer Science (Vol. 2045, pp. 453–474). Springer.
  • 14.Qu, M., & Vanstone, S. (1997) . Implicit Certificate Schemes, preprint
  • 15.Braeken A, Kumar P, Martin A. Efficient and provably secure key agreement for modern smart metering communications. Energies. 2018;11(10):2662. doi: 10.3390/en11102662. [DOI] [Google Scholar]
  • 16.Burmester M, Desmedt Y. A secure and efficient conference key distribution system. Eurocrypt. 1994;1994:275–286. [Google Scholar]
  • 17.Brown, D. R. L., Gallant, R., & Vanstone, S. A. (2001). Provably secure implicit certificate schemes. In Financial cryptography, lecture notes in Computer Science (Vol. 2339, pp. 56–165). Springer.
  • 18.Wei G, Yang X, Shao J. Efficient certificateless authenticated asymmetric group key agreement protocol. KSII Transactions Internet Information Systems. 2012;6(12):3352–3364. [Google Scholar]
  • 19.Smart, N. P. (2001). The exact security of ECIES in the generic group model. In Cryptography and coding, lecture notes in computer science (Vol. 2260, pp. 73–84). Springer.

Articles from Wireless Personal Communications are provided here courtesy of Nature Publishing Group

RESOURCES